Felix Schuster is an academic turned startup founder. After his PhD in computer security, he joined Microsoft Research to work four years on the foundations of Azure Confidential Computing, before co-founding Edgeless Systems. The startup’s vision is to build an open-source stack for cloud-native Confidential Computing. Throughout his career, Felix has frequently given technical talks at top-tier conferences, including Usenix Security Symposium, IEEE Symposium on Security & Privacy, and ACM CCS. His 2015 paper on the “VC3” system is believed by some to have coined the term Confidential Computing.
Conrad Grobler is a software engineer on Project Oak, which is part of Google DeepMind. Project Oak combines confidential computing, remote attestation, and ideas from supply-chain security to provide externally checkable claims about how data is used and processed.
Dan Middleton is a Senior Principal Engineer at Intel, with over 20 years of experience in the technology industry. Throughout his career, Dan has been instrumental in developing and releasing innovative products in emerging fields such as Software as a Service (SaaS), Computational Imaging, Blockchain, and Confidential Computing.Dan has a distinguished track record of leadership in the open-source community. He currently serves as the Chair of the Technical Advisory Council for the Confidential Computing Consortium. Previously, he chaired Hyperledger, the predecessor of LF Decentralized Trust, and has actively represented Intel in various Linux Foundation projects, including the Cloud Native Computing Foundation (CNCF) Confidential Containers (CoCo) and the Open Source Security Foundation.Dan's contributions have significantly advanced the state of technology in these areas, and his leadership continues to drive innovation and collaboration within the industry.
Fritz Alder is a Senior Security Architect for confidential computing at NVIDIA and represents NVIDIA in the technical advisory council of the confidential computing consortium. He holds a PhD in confidential computing from KU Leuven, Belgium, and has broad research experience on trusted execution environments including designing and architecting secure hardware, integrating confidential computing in the cloud, as well as software and interface attacks on enclaves. He is one of the organizers of the FOSDEM devroom on confidential computing.
Main developer of the Enarx project, a webassembly runtime in a trusted execution environment (SGX and SEV-SNP) written in rust. Was heavily involved in dracut (initramfs), systemd (PID 1) and merging of / and /usr while working for Red Hat over 20 years.
Ijlal Loutfi is the Product Lead for platform Security at Canonical. She is also a part-time lecturer at the University of Oslo. She started working on confidential computing back during her PhD studies at the University of Oslo, where she researched trusted execution environments for commodity end-point devices. She also spent time as a visiting researcher at various labs, including HP Security Labs in Bristol.After completing her PhD, Ijlal joined the Norwegian Computing Center to focus on privacy-enhancing technologies.Earlier in her career, she worked as a field Consultant with Microsoft, deploying identity management and access control solution to enterprise customers.
Jörg is leading the Confidential Computing efforts at SUSE and is working with AMD on enabling SEV and related technologies. In this role he implemented major parts of the AMD SEV-ES guest support in the Linux kernel and brought it upstream into kernel 5.10. He is also active in the Linux kernel community as the maintainer for the IOMMU subsystem and a contributor to other areas like KVM or the X86 architecture.
Keith works in Google Cloud's Confidential Computing team as a Staff Software Engineer, TL, and Manager. With a focus on Attestation, Keith has led projects such as Asylo and Confidential Space. Prior to Google, Keith worked for 12 years in the enterprise storage industry as a Firmware Developer and Software Architect.
An engineer at heart with a passion for innovation, Marc is never far from a soldering iron or a pile of design books. After years of leading engineering teams in live-video production, mobile devices, and Fintech, Marc gravitated towards inter-company leadership roles that focus on innovative architectures to accelerate high tech innovation. As the Director of Ecosystem Development, Marc leads projects in security and networking as part of the Infrastructure line of business at Arm. To nurture a global framework for these projects, Marc sits on the governing board for the Confidential Compute Consortium, the DataPlane Development Kit project and the Open Programmable Infrastructure project.Nathaniel McCallumArm
Moritz Eckert is a cloud security enthusiast. With a past in software security research he now leads product development at Edgeless Systems. Moritz is a passionate engineer and has presented at top-tier conferences including Usenix Security Symposium, EuropeClouds Summit, and OC3 in the past. Alongside his professional work, Moritz is part of Shellphish, one of the highest-ranked competitive hacking groups in the world.
Nathaniel is a 25 year industry veteran with broad experience in cryptography, operating systems and confidential computing. He is a Fellow at AMD where he works on SEV-SNP architecture, especially attestation and related tooling. Nathaniel lives in Raleigh, NC with his wife and five children.
Nicolas Mäding is Principal Product Manager at the IBM Lab in Böblingen, Germany. He received his Dipl. Ing. Degree in Electrical and Information Technology at the Technical University of Chemnitz, Germany. He joined IBM in 2001 and worked in various development and management positions in IBM Systems Hardware Development. He joined the Z-as-a-Service organization as Release Manager of the Hyper Protect Hosting Appliance in 2018 and became product manager for the Secure Execution based offerings. In 2023 he was appointed as Principal Product Manager for the Hyper Protect Platform and Confidential Computing on LinuxONE and Linux on IBM Z. He is author or co-author of more than 12 patents and several technical papers.
Pawan Khandavilli is a senior product manager in Azure Confidential Computing (ACC) with a focus on serverless and confidential computing. Pawan has previously worked at Fortanix and the Royal Bank of Canada in a variety of roles with a focus on applying innovative security technologies to business problems. Pawan is passionate about data security and privacy and is a certified information privacy technologist.
Ravi Sahita is a Principal Security Architect at Rivos Inc. He is an expert in scalable trusted execution environments, hardware virtualization and software hardening. At Rivos, he leads the definition of Confidential AI along with security-related ISA, platform and software initiatives. Ravi is also the vice-chair of the RISC-V Security Horizontal Committee leading the RISC-V Confidential Computing task groups. In past work at Intel as Sr. Principal Engineer and manager, he led the security definition of confidential computing on Intel architecture (TDX), exploit prevention ISA (for Control flow integrity and Virtualization-based security), and has implemented novel hypervisors for OS runtime-integrity (DeepSAFE). Ravi has authored key technical specifications in RVI, IETF and TCG. He is a prolific inventor with contributions to 220 patents and is the recipient of 2 Intel Achievement Awards.
Reshma is a security architect at AMD working on advancing Confidential Computing technologies to deliver secure computing solutions optimized for power-performance and user experience. Her interests include developing security solutions to meet the emerging needs of massive compute workloads such as AI/ML on heterogenous computing systems. Prior to this, Reshma worked as a Principal Engineer in Intel’s Security and Privacy Research Lab on innovative technologies to extend trusted execution environment to HW accelerators and IO devices. Earlier at Intel, she led or collaborated in the development of several SW and HW technologies including real time kernel, BIOS & firmware, parallel computing systems, and has partnered with industry, government, and academia, in advancing the latest CPU technologies.
Shweta Shinde is an assistant professor at ETH Zurich, where she leads the Secure and Trustworthy Systems Group. Her research is broadly at the intersection of trusted computing, system security, and program analysis. Her group focuses on foundational aspects of confidential computing to protect phones, servers, and accelerators as well as practical aspects of building large systems.
Simon is an Intel Fellow and Chief Security Architect. As a confidential computing technical evangelist, Simon engages with partner organizations on how to deliver world-class experiences and identify and accelerate the next generation of hardware capabilities in the confidential computing space. He has led the team that brought Intel SGX to the datacenter and is now leading the technology development of Intel TDX. Simon has worked in the security space for over 30 years, split between working for the UK government and Intel. He is based in Jones Farm, Oregon
Stefano is a Principal Software Engineer at Red Hat. He is the maintainer of Linux's vsock subsystem (AF_VSOCK) and co-maintainer of rust-vmm. Current projects cover Confidential VMs, virtio devices, storage for VMs.
Thomas is an engineer in the Linux Kernel WG at Linaro.
Vikas Bhatia is the Head of Product for Azure Confidential Computing (ACC) and is responsible for designing products and services that organizations around the world leverage to ensure that their workloads are running confidentially on Azure by protecting data when in use. He leads a team responsible for products and services including confidential virtual machines, containers, and applications on confidential hardware across CPUs and GPUs. He is also responsible for services in Azure that leverage the confidential platform to themselves become confidential. Prior to this role, Vikas led the Product team for Project Rome in the Windows Developer Platform team. He has also done stints on Cloud Game Streaming, Xbox One and the C++ Compiler in DevDiv. Vikas has an MBA from the University of Washington, Foster School of Business and a MS in Computer Science from the University of Alabama.